Habilidades security-bluebook-builder
📋

security-bluebook-builder

Seguro

Build Security Blue Books

Create comprehensive security documentation for sensitive applications. This skill provides patterns and guidance for building security Blue Books that document security controls, threat models, and compliance requirements.

Suporta: Claude Codex Code(CC)
🥉 72 Bronze
1

Baixar o ZIP da skill

2

Upload no Claude

Vá em Configurações → Capacidades → Skills → Upload skill

3

Ative e comece a usar

Testar

A utilizar "security-bluebook-builder". Create a security Blue Book for a healthcare application that handles patient data

Resultado esperado:

Security Blue Book Outline:

1. Executive Summary
2. Application Overview
3. Data Classification (PHI, PII)
4. Threat Model
- Assets: Patient records, authentication
- Threat Actors: External attackers, insider threats
- Attack Vectors: SQL injection, XSS, privilege escalation
5. Security Controls
- Access Control
- Encryption (AES-256 for data at rest, TLS 1.3 in transit)
- Audit Logging
6. Compliance Mapping (HIPAA)
7. Incident Response Procedures

A utilizar "security-bluebook-builder". Add threat model to our financial transaction processing system

Resultado esperado:

Threat Model Section:

## Assets
- Transaction data
- User credentials
- API keys

## Threat Actors
- External attackers
- Malicious insiders
- Automated bots

## Attack Vectors
- API abuse
- Credential stuffing
- Data exfiltration

## Mitigation Strategies
- Rate limiting
- MFA enforcement
- DLP controls

Auditoria de Segurança

Seguro
v1 • 2/25/2026

Static analysis flagged hardcoded URLs and weak cryptographic algorithms, but evaluation reveals these are false positives. The URLs are legitimate documentation links to the skill's GitHub repository. The cryptographic flag was triggered by the word 'build' in 'build security blue books', which refers to documentation creation, not cryptography. This is a simple documentation skill with no security concerns.

1
Arquivos analisados
23
Linhas analisadas
2
achados
1
Total de auditorias
Problemas de Baixo Risco (2)
Hardcoded URLs in Documentation
Static scanner flagged URLs at lines 4 and 22 as hardcoded network references. These are legitimate documentation links to the skill's GitHub repository.
False Positive: Cryptographic Algorithm Flag
Static scanner flagged 'build' as a weak cryptographic algorithm. This is a false positive - the skill is about building security documentation ('Blue Books'), not cryptography.
Auditado por: claude

Pontuação de qualidade

38
Arquitetura
95
Manutenibilidade
87
Conteúdo
50
Comunidade
100
Segurança
83
Conformidade com especificações

O Que Você Pode Construir

New Application Security Documentation

Generate initial security Blue Book structure for a new sensitive application, including security controls, threat model sections, and compliance mappings.

Compliance Documentation Update

Refresh existing security documentation to meet new compliance requirements or update threat model sections.

Security Documentation Review

Review and improve existing security Blue Books for completeness and accuracy.

Tente Estes Prompts

Create New Blue Book
Create a security Blue Book for my new application [application name]. It handles [sensitive data types] and is deployed on [infrastructure]. Generate a comprehensive documentation structure including threat model, security controls, and compliance sections.
Add Threat Model Section
Add a threat model section to the existing security Blue Book for [application]. Include sections for assets, threat actors, attack vectors, and mitigation strategies.
Map Compliance Requirements
Create a compliance mapping section for [regulation/standard] in our security Blue Book. Map our existing security controls to the required compliance criteria.
Review Security Controls
Review the security controls section of our Blue Book for [application]. Identify gaps, suggest improvements, and ensure coverage of OWASP Top 10 and common attack vectors.

Melhores Práticas

  • Start with a clear data classification section to define what needs protection
  • Include both technical controls and procedural security measures
  • Regularly update threat models as the application evolves

Evitar

  • Copy-pasting generic security templates without customization
  • Ignoring non-functional security requirements like incident response
  • Failing to document security decisions and their rationale

Perguntas Frequentes

What is a security Blue Book?
A security Blue Book is comprehensive documentation that outlines an application's security controls, threat models, compliance requirements, and security architecture decisions.
Does this skill perform security testing?
No, this skill generates documentation templates and guidance. It does not execute security scans or tests.
Which compliance standards does this support?
The skill can help document compliance with various standards including SOC 2, HIPAA, PCI-DSS, and ISO 27001.
Can I use this for cloud infrastructure documentation?
Yes, the skill provides guidance for documenting security controls for cloud-based applications and infrastructure.
How detailed is the generated documentation?
The skill generates comprehensive outlines and templates. You should expand each section with specific details about your application.
Does this work for microservices architectures?
Yes, the documentation templates can be adapted for microservices, including service-to-service security and API security sections.

Detalhes do Desenvolvedor

Estrutura de arquivos

📄 SKILL.md